Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017 : proceedings / Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí (eds.).

Author
DPM (Workshop) (12th : 2017 : Oslo, Norway) [Browse]
Format
Book
Language
English
Published/​Created
  • Cham, Switzerland : Springer, [2017]
  • ©2017
Description
xiii, 446 pages : illustrations ; 24 cm

Availability

Copies in the Library

Location Call Number Status Location Service Notes
Engineering Library - Stacks QA76.9.A25 D37 2017 Browse related items Request

    Details

    Subject(s)
    Editor
    Series
    Summary note
    This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017. The DPM Workshop received 51 submissions from which 16 full papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. From the CBT Workshop six full papers and four short papers out of 27 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing.
    Notes
    International conference proceedings.
    Bibliographic references
    Includes bibliographical references and index.
    Contents
    • Privacy, logics, and computational models. A proof calculus for attack trees in Isabelle / Florian Kammüller
    • Confidentiality of interactions in concurrent object-oriented systems / Olaf Owe, Toktam Ramezanifarkhani
    • Using oblivious RAM in genomic studies / Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser
    • Privacy and encrypted search. Towards efficient and secure encrypted databases: extending message-locked encryption in three-party model / Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yaunori Ishihara, Toru Fuji
    • Searchable encrypted relational databases: risks and countermeasures / Mohamed Ahmed Abhdelraheem, Tobias Andersson, Chirstian Gehrmann
    • Private verification of access on medical data: an initial study ; Thaís Bardini Idalino, Dayana Spagnuelo, Jean Everson martina
    • Data privacy, data mining, and applications. Default privacy setting prediction by grouping user's attributes and settings preferences /Toru Nakamura, Wlderufael B. Tesfay, Shinsaku Kiyomoto, HJetzabel Serna
    • [Lambda]-privacy: bounding privacy leaks in privacy preserving data mining / Zhizhou li, Ten H. Lai
    • Threshold single password authentication / Devris Isler, Alptekin Küpçü
    • Towards a toolkit for utility and privacy-preserving transformation of semi-structured data using data pseudonymization / Saffija Kasem-Madani, Michael Meier, Martin Wehner
    • User privacy. Pivacy dashcam--towards lawful use of dashcams through enforcement of external anonymization / Paul Wagner, Pascal Birnstill, Erik Krempel, Sebastian Bretthauer, Jürgen Beyerer
    • DLoc: distributed auditing for data location compliance in cloud / Mojtaba Eskandari, Bruno Crispo, Anderson Santana de Oliveira
    • Inonymous: anonymous invitation-based system / Sanaz Taheri Boshrooyeh, Alptekin Küpçü
    • Applied crryptography and privacy. PCS, a privacy-preserving certification scheme / Nestine Kaaniche, Maryline Laurent, Pierre-Olicier Rocher, Christophe Kiennert, Joaquin Garcia-Alfaro
    • Order-preserving encryption using approximate integer common divisors / James Dyer, Martin Dyer, Jie Xu
    • Privacy-preserving deterministic automata evaluation with encrypted data blocks / Giovanni Di Crescenzo, Brian Coan, Jonathan Kirsch
    • Consensus and smart contracts. Securing proof-of-stake blockchain protocols / Wenting Li, Sébastien Andreina, Jens-Matthias Bohli, Ghassan Karame
    • Merged mining: curse or cure? / Aljosha Judmayer, Alexei Zamyatin, Nicholas Stifter, Artemios G. Voyiatzis, Edgar Weippl
    • Atomically trading with Roger: gambling on the success of a hardfork / Patrick McCorry, Ethan Heilman, Andrew Miller
    • Smart contracts and blockchain identity. In code we trust? Measuring the control flow immutability of all smart contracts deplyed on ethereum / Michael Fröwis, Rainer Böhme
    • Who am I? Secure identity registration on distributed ledgers / Sarah Azouvi, Mustafa Al-Bassam, Sarah Meiklejohn
    • A user-centric system for verified identities on the Bitcoin blockchain / Daniel Augot, Hervé Chabanne, Thomas Chenevier, William George, Laurent Lambert
    • Short papers. Towards a concurrent and distributed route selection for payment channel networks / Elias Rohere, Jann-Frederik Laß, Florian Tschorsch
    • Graphene: a new protocol for block propagation using set reconciliation / A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansade, Brian Levine
    • Revisiting difficulty control for blockchain systems / Dmitry Meshkov, Alexander Chepurnoy, Marc Jansen
    • Secure event tickets on a blockchain / Björn Tackmann.
    Other title(s)
    • DPM 2017
    • CBT 2017
    ISBN
    • 9783319678153 ((print))
    • 3319678159 ((print))
    OCLC
    1002126652
    Statement on language in description
    Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
    Other views
    Staff view